A system and method for providing access to a web server on an electronic device positioned within a firewall. A gateway device including a gateway server is provided outside of the firewall. The gateway device includes an IP address that corresponds to the same DNS extension that is used in the DNS name of the web server. When a client device attempts to contact the web server through the DNS name, the request is transmitted to the gateway server, which in turn communicates with the web server.
|
1. A method comprising:
receiving, at a gateway server outside of a firewall from a mobile device behind the firewall, a request to open a hypertext transfer protocol (http) connection using a first port;
receiving, in a request from the mobile device over the http connection, information indicating that a second port cannot be used;
creating a socket using a third port in response to the received information indicating that the second port cannot be used;
transmitting an indicator of the third port to the mobile device in an http reply;
receiving, at the gateway server from a client device, a request for information from a web server;
transmitting the request for information to the mobile device over a connection created by opening the created socket;
receiving a reply to the transmitted request from the mobile device;
forwarding the reply from the mobile device to the client device: and
subsequent to receipt of the information indicating that the second port cannot be used and prior to creating the socket using the third port:
(a) creating a socket using a fourth port;
(b) transmitting an indicator of the fourth port to the mobile device in an http reply;
(c) receiving, in a request from the mobile device over the http connection, information indicating that a fourth port cannot be used; and
(d) repeating (a) through (c) with regard to additional ports.
10. A method comprising:
attempting, from a mobile device behind a firewall, to open a socket at a gateway server outside the firewall using a second port;
in response to failure of the attempt to open the socket using the second port, opening a hypertext transfer protocol (http) connection to the gateway server using a first port;
sending information to the gateway server, over the opened http connection, indicating that the second port cannot be used;
receiving an http reply from the gateway server in response to the sent information, the http reply including an indicator of a third port;
opening a socket at the third port and creating a second connection;
receiving, from the gateway server over the second connection, a relayed request from a client device for information from a web server running on the mobile device;
transmitting a reply to the relayed request to the gateway server: and
subsequent to sending information to the gateway server indicating that the second port cannot be used and prior to receiving the http reply including the indicator of the third port:
(a) creating a socket using a fourth port;
(b) receiving an http reply from the gateway server including an indicator of the fourth port;
(c) sending information to the gateway server indicating that the fourth port cannot be used; and
(d) repeating (a) through (c) with regard to additional ports.
7. An apparatus, comprising:
a gateway server having a controller configured to:
receive, when the gateway server is outside of a firewall and from a mobile device behind the firewall, a request to open a hypertext transfer protocol (http) connection using a first port,
receive, in a request from the mobile device over the http connection, information indicating that a second port cannot be used,
create a socket using a third port in response to the received information indicating that the second port cannot be used,
transmit an indicator of the third port to the mobile device in an http reply,
receive, from a client device, a request for information from a web server,
transmit the request for information to the mobile device over a connection created by opening the created socket,
receive a reply to the transmitted request from the mobile device,
forward the reply from the mobile device to the client device, and
subsequent to receipt of the information indicating that the second port cannot be used and prior to creating the socket using the third port,
(a) create a socket using a fourth port,
(b) transmit an indicator of the fourth port to the mobile device in an http reply,
(c) receive, in a request from the mobile device over the http connection, information indicating that a fourth port cannot be used, and
(d) repeat (a) through (c) with regard to additional ports.
14. An apparatus, comprising:
a mobile device including a controller configured to:
attempt, when the mobile device is behind a firewall, to open a socket at a gateway server outside the firewall using a second port,
in response to failure of the attempt to open the socket using the second port, open a hypertext transfer protocol (http) connection to the gateway server using a first port,
send information to the gateway server, over the opened http connection, indicating that the second port cannot be used,
receive an http reply from the gateway server in response to the sent information, the http reply including an indicator of a third port,
open a socket at the third port and create a second connection,
receive, from the gateway server over the second connection, a relayed request from a client device for information from a web server running on the mobile device,
transmit a reply to the relayed request to the gateway server, and
subsequent to sending information to the gateway server indicating that the second port cannot be used and prior to receiving the http reply including the indicator of the third port,
(a) create a socket using a fourth port,
(b) receive an http reply from the gateway server including an indicator of the fourth port,
(c) send information to the gateway server indicating that the fourth port cannot be used, and
(d) repeat (a) through (c) with regard to additional ports.
4. A memory having stored thereon instructions which, when executed by a processor, cause an apparatus to perform operations, said operations comprising:
receiving, at a gateway server outside of a firewall from a mobile device behind the firewall, a request to open a hypertext transfer protocol (http) connection using a first port;
receiving, in a request from the mobile device over the http connection, information indicating that a second port cannot be used;
creating a socket using a third port in response to the received information indicating that the second port cannot be used;
transmitting an indicator of the third port to the mobile device in an http reply;
receiving, at the gateway server from a client device, a request for information from a web server;
transmitting the request for information to the mobile device over a connection created by opening the created socket;
receiving a reply to the transmitted request from the mobile device;
forwarding the reply from the mobile device to the client device: and
subsequent to receipt of the information indicating that the second port cannot be used and prior to creating the socket using the third port:
(a) creating a socket using a fourth port;
(b) transmitting an indicator of the fourth port to the mobile device in an http reply;
(c) receiving, in a request from the mobile device over the http connection, information indicating that a fourth port cannot be used; and
(d) repeating (a) through (c) with regard to additional ports.
12. A memory having stored thereon instructions which, when executed by a processor, cause an apparatus to perform operations, said operations comprising:
attempting, from a mobile device behind a firewall, to open a socket at a gateway server outside the firewall using a second port;
in response to failure of the attempt to open the socket using the second port, opening a hypertext transfer protocol (http) connection to the gateway server using a first port;
sending information to the gateway server, over the opened http connection, indicating that the second port cannot be used;
receiving an http reply from the gateway server in response to the sent information, the http reply including an indicator of a third port;
opening a socket at the third port and creating a second connection;
receiving, from the gateway server over the second connection, a relayed request from a client device for information from a web server running on the mobile device;
transmitting a reply to the relayed request to the gateway server: and
subsequent to sending information to the gateway server indicating that the second port cannot be used and prior to receiving the http reply including the indicator of the third port, additional operations comprising:
(a) creating a socket using a fourth port;
(b) receiving an http reply from the gateway server including an indicator of the fourth port;
(c) sending information to the gateway server indicating that the fourth port cannot be used; and
(d) repeating (a) through (c) with regard to additional ports.
2. The method of
3. The method of
5. The memory of
6. The memory of
8. The apparatus of
9. The apparatus of
11. The method of
13. The memory of
15. The apparatus of
|
The present invention relates generally to web servers on mobile electronic devices. More particularly, the present invention relates to the accessing of web servers on mobile electronic devices that are located behind a firewall.
Currently, network connectivity for mobile devices such as mobile telephones are provided by an operator. The network connectivity can involve the use of systems, such the general packet radio service (GPRS), that allow information to be sent and received across a mobile telephone network. It may be desirable for a server to be placed on that mobile device, where the server can be accessible by clients running on devices on the Internet.
In such a system, however, there are currently a number of obstacles that must be overcome. In current operator networks, mobile devices are assigned temporary Internet Protocol (IP) addresses. Client devices attempting to access a web server on such a device must therefore be provided with a way of reaching the server that is independent of the IP address that has been assigned to the mobile device. This constitutes a basic problem of addressability in such a system.
Even if a mobile device with a built-in server is assigned a static IP address, however, or if techniques such as dynamic domain name systems (DNS) are used, the server would still be inaccessible. This is due to the fact that operator firewalls typically do not allow connections to be created from a device on the Internet to a mobile device inside the operator's network. Instead, connections must be created from the inside of the operator's network and extend outward to the client device.
Although there have been attempts to address this accessibility issue, each of these proposed solutions possess serious shortcomings. One proposed solution involves port knocking. With port knocking, when certain firewall port numbers are knocked in a “secret” sequence, then one particular port number is opened for a short period of time. This concept is discussed at www.linuxjournal.com/article.php?sid=6811. Another solution involves the use of a firewall control protocol (FCP), which can enable a third, trusted party to dynamically control the firewall (i.e., which ports are opened, the period of time the ports are opened, which clients are permitted to have the ports opened, etc.) FCP is discussed at www.iptel.org/fcp/ietf-fcp.ppt. For both of these systems, however, there is a requirement that the out-of-network device be given at least some indirect control of the firewall. To satisfy this requirement, operators would need to invest more in their infrastructure and possibly attempt to solve a problem for which there is no correctly existing industry-standard. Moreover, making firewalls dynamically configurable would also result in a need to modify web browsers, which is undesirable.
In addition to the above, even if the mobile device possessing the server and the device from which the server is accessed are in the same operator network, there are still no guarantees that the server could be accessed, even if the client knows the temporary IP address. In particular, typical operators do not currently route packets directly between the mobile devices.
The present invention addresses the issues discussed above by introducing a gateway that transparently delivers requests from client devices on the Internet to a web server on a mobile device such as a mobile telephone. Similarly, the gateway delivers replies from the mobile web server to the client that initiated the request.
The system and method of the present invention provides for a number of advantages over conventional systems. The present permits access to a web server on mobile devices such as mobile phones in currently-existing operator networks, while not requiring any involvement from the operator of the respective device. Additionally, the present invention allows devices such as mobile telephones to become full members of the Internet, without having to wait for the Mobile IPv6 protocol to become available.
These and other objects, advantages and features of the invention, together with the organization and manner of operation thereof, will become apparent from the following detailed description when taken in conjunction with the accompanying drawings, wherein like elements have like numerals throughout the several drawings described below.
For exemplification, the system 10 shown in
The exemplary communication devices of system 10 may include, but are not limited to, a mobile telephone 12, a combination PDA and mobile telephone 14, a PDA 16, an integrated messaging device (IMD) 18, a desktop computer 20, and a notebook computer 22. The communication devices may be stationary or mobile as when carried by an individual who is moving. The communication devices may also be located in a mode of transportation including, but not limited to, an automobile, a truck, a taxi, a bus, a boat, an airplane, a bicycle, a motorcycle, etc. Some or all of the communication devices may send and receive calls and messages and communicate with service providers through a wireless connection 25 to a base station 24. The base station 24 may be connected to a network server 26 that allows communication between the mobile telephone network 11 and the Internet 28. The system 10 may include additional communication devices and communication devices of different types.
The communication devices may communicate using various transmission technologies including, but not limited to, Code Division Multiple Access (CDMA), Global System for Mobile Communications (GSM), Universal Mobile Telecommunications System (UMTS), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Transmission Control Protocol/Internet Protocol (TCP/IP), Short Messaging Service (SMS), Multimedia Messaging Service (MMS), e-mail, Instant Messaging Service (IMS), Bluetooth, IEEE 802.11, etc. A communication device may communicate using various media including, but not limited to, radio, infrared, laser, cable connection, and the like.
The present invention, depicted in simplified form in
According to the present invention, the protocol to be used in the communication between client device 120 on the Internet and the web server 110 on the mobile device 100 is such that the request, when sent by the client device 120 to the web server 110, contains information about which electronic device 100 the request is intended for. A gateway computer 130 is also set up somewhere on the Internet, outside of the operator firewall. The gateway computer 130 includes a gateway server 140 that listens on two ports. One port is well-known to client devices 120 on the Internet 28 (the HTTP port), while the port is referred to as a specific port. The client device 120, the mobile device 100 and the gateway computer 130 can all possess circuitry and functionality of the type described in
The mobile device 100 containing the web server 110 proceeds to open a connection to the specific port of the gateway server 140. Each mobile device 100 is assigned a name and is arranged so that DNS lookups for that name result in the IP address of the gateway computer 130 being returned. The gateway server 140 looks at each request arriving from various client devices 120 to the well-known port and uses the content in order to deduce for which mobile device 100 the request is intended. The gateway server 140 then delivers the request over the connection that was opened by the mobile device 100. The web server 110 on the mobile device 100 will then return a reply over the same connection, and the reply is transmitted to the client device 120. In this process, it appears as if the web server 110 on the mobile device 100 is directly accessible from any client device 120 on the Internet. Thus, the mobile device 100 has become both addressable and accessible.
On implementation of the present invention is generally as follows and is represented in
As discussed earlier, the gateway computer 130 includes a gateway server 140, which listens to the usual HTTP port 80, and, for example to port 2050. On the mobile telephone, the web server 110 is running at step 500, and it listens to the usual HTTP port 80. However, this web server 110 is not accessible by anyone outside of the mobile telephone due to the problems discussed above. Furthermore, another process, referred to herein as the connector, is running, The connector opens a socket to port 2050 at step 505. As part of the opening of that socket, the connector declares the identity of the mobile telephone. As part of this opening sequence, the gateway server 140 learns the name of the mobile telephone. In this example, the mobile telephone is known as “alice.”
In the event that someone on the Internet attempts to browse to alice.name.mu, the following sequence of events occurs. The browser on the client device 120 performs a lookup for alice.name.mu at step 510. This lookup returns 10.20.30.40 as a result at step 515, which is the IP address of the gateway server 140. The browser proceeds to the HTTP port 80 on 10.20.30.40 and to transmit a regular HTTP request at step 520. The HTTP request header includes alice.name.mu in its host field.
From the value of the host field, the gateway sever deduces the recipient for the request at step 525. If the device known as alice has opened a connection to the gateway server 140, then the gateway server 140 sends the request to the mobile telephone over that connection at step 535. If the mobile telephone has not opened a connection to the gateway server, then the gateway server 140 responds with the appropriate error reply at step 530. When the request reaches the connector on the mobile telephone, the connector transmits it to the web server 110 running on the mobile telephone at step 540. When the web server 110 replies, the connector sends the reply back to the gateway server at step 545. The gateway server then proceeds to send it back to the browser that made the initial request at step 550. Therefore, to the individual using the browser, it appears as if the mobile telephone was directly accessible using the url alice.name.mu.
The solution depicted in
As depicted in
The present invention is described in the general context of method steps, which may be implemented in one embodiment by a program product including computer-executable instructions, such as program code, executed by computers in networked environments.
Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such steps.
Software and web implementations of the present invention could be accomplished with standard programming techniques, with rule based logic, and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps. It should also be noted that the words “component” and “module” as used herein, and in the claims, is intended to encompass implementations using one or more lines of software code, and/or hardware implementations, and/or equipment for receiving manual inputs.
The foregoing description of embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the present invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the present invention. The embodiments were chosen and described in order to explain the principles of the present invention and its practical application to enable one skilled in the art to utilize the present invention in various embodiments and with various modifications as are suited to the particular use contemplated.
Dosa, Ferenc, Wikman, Johan, Palko, Sakari
Patent | Priority | Assignee | Title |
10305915, | Dec 13 2010 | VERTICAL COMPUTER SYSTEMS INC | Peer-to-peer social network |
10659322, | May 22 2013 | Mitsubishi Electric Corporation | Monitoring system, facility management device, monitoring method, and program |
10834056, | Jul 31 2018 | CA, INC | Dynamically controlling firewall ports based on server transactions to reduce risks |
9386105, | Nov 02 2011 | Microsoft Technology Licensing, LLC | Techniques for dynamic domain-based isolation |
9710425, | Dec 13 2010 | Vertical Computer Systems, Inc.; VERTICAL COMPUTER SYSTEMS, INC | Mobile proxy server for internet server having a dynamic IP address |
Patent | Priority | Assignee | Title |
5999979, | Jan 30 1997 | Microsoft Technology Licensing, LLC | Method and apparatus for determining a most advantageous protocol for use in a computer network |
6182141, | Dec 20 1996 | Intel Corporation | Transparent proxy server |
6212556, | Nov 13 1995 | ARUNACHALAM, LAKSHMI, DR | Configurable value-added network (VAN) switching |
6334056, | May 28 1999 | Qwest Communications International Inc | Secure gateway processing for handheld device markup language (HDML) |
6519568, | Jun 15 1999 | Schlumberger Technology Corporation | System and method for electronic data delivery |
6587882, | Aug 01 1997 | Kabushiki Kaisha Toshiba | Mobile IP communication scheme using visited site or nearby network as temporal home network |
6591306, | Apr 01 1999 | NEC Corporation | IP network access for portable devices |
6631416, | Apr 12 2000 | Oracle Systems Corporation | Methods and systems for enabling a tunnel between two computers on a network |
6631417, | Mar 29 2000 | Progress Software Corporation | Methods and apparatus for securing access to a computer |
6647001, | Dec 06 1999 | AT&T Corp. | Persistent communication with changing environment |
6704295, | Oct 29 1998 | Mitsubishi Materials Corporation | Radio communication system for push information delivery |
6988147, | May 31 2001 | UNWIRED PLANET IP MANAGER, LLC; Unwired Planet, LLC | Method of establishing a secure tunnel through a proxy server between a user device and a secure server |
7236470, | Jan 11 2002 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Tracking multiple interface connections by mobile stations |
7324473, | Oct 07 2003 | Accenture Global Services Limited | Connector gateway |
7441270, | Jul 06 2000 | Intel Corporation | Connectivity in the presence of barriers |
7506368, | Feb 13 2003 | Cisco Technology, Inc. | Methods and apparatus for network communications via a transparent security proxy |
7533164, | Apr 08 2002 | TELEFONAKTIEBOLAGET LM ERICSSON PUBL | Method and system for enabling connections into networks with local address realms |
7533409, | Mar 22 2001 | Oracle Systems Corporation | Methods and systems for firewalling virtual private networks |
7810148, | Feb 25 2005 | Microsoft Technology Licensing, LLC | Enabling terminal services through a firewall |
7814533, | Sep 26 1997 | Verizon Patent and Licensing Inc | Secure customer interface for Web based data management |
7900240, | May 28 2003 | Citrix Systems, Inc | Multilayer access control security system |
7904569, | Oct 06 1999 | Intellectual Ventures I LLC | Method for remote access of vehicle components |
7949785, | Mar 31 2003 | Intellectual Ventures I LLC | Secure virtual community network system |
8015271, | Mar 26 2001 | Accenture Global Services Limited | Method and system of provisioning a desired communication service for a user across a network |
8037202, | Oct 31 2002 | Oracle America, Inc | Presence detection using mobile agents in peer-to-peer networks |
20020023140, | |||
20020078198, | |||
20020199114, | |||
20030033416, | |||
20030039237, | |||
20030112823, | |||
20030154306, | |||
20030174648, | |||
20040044778, | |||
20040179537, | |||
20050004968, | |||
20050014489, | |||
20050015386, | |||
20050073982, | |||
20050148323, | |||
20050180398, | |||
20050229243, | |||
20060272014, | |||
20070165579, | |||
20080010676, | |||
20080281900, | |||
20100241846, | |||
FR2861934, | |||
WO2067540, | |||
WO2005043847, | |||
WO9831124, | |||
WO2005003987, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 03 2005 | Nokia Corporation | (assignment on the face of the patent) | / | |||
Sep 09 2005 | WIKMAN, JOHAN | Nokia Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 016999 | /0673 | |
Sep 09 2005 | DOSA, FERENC | Nokia Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 016999 | /0673 | |
Sep 09 2005 | PALKO, SAKARI | Nokia Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 016999 | /0673 | |
Jan 16 2015 | Nokia Corporation | Nokia Technologies Oy | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 035495 | /0920 |
Date | Maintenance Fee Events |
Nov 11 2015 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Nov 15 2019 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 15 2024 | REM: Maintenance Fee Reminder Mailed. |
Jul 01 2024 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
May 29 2015 | 4 years fee payment window open |
Nov 29 2015 | 6 months grace period start (w surcharge) |
May 29 2016 | patent expiry (for year 4) |
May 29 2018 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 29 2019 | 8 years fee payment window open |
Nov 29 2019 | 6 months grace period start (w surcharge) |
May 29 2020 | patent expiry (for year 8) |
May 29 2022 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 29 2023 | 12 years fee payment window open |
Nov 29 2023 | 6 months grace period start (w surcharge) |
May 29 2024 | patent expiry (for year 12) |
May 29 2026 | 2 years to revive unintentionally abandoned end. (for year 12) |